US11715309B2 - Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image - Google Patents
Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image Download PDFInfo
- Publication number
- US11715309B2 US11715309B2 US16/973,071 US201916973071A US11715309B2 US 11715309 B2 US11715309 B2 US 11715309B2 US 201916973071 A US201916973071 A US 201916973071A US 11715309 B2 US11715309 B2 US 11715309B2
- Authority
- US
- United States
- Prior art keywords
- color
- serial number
- halftone
- printing
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/80—Recognising image objects characterised by unique random patterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
- G07D7/0047—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip using checkcodes, e.g. coded numbers derived from serial number and denomination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K15/00—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
- G06K15/02—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
- G06K15/18—Conditioning data for presenting it to the physical printing elements
- G06K15/1835—Transforming generic data
- G06K15/1836—Rasterization
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K15/00—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers
- G06K15/02—Arrangements for producing a permanent visual presentation of the output data, e.g. computer output printers using printers
- G06K15/18—Conditioning data for presenting it to the physical printing elements
- G06K15/1867—Post-processing of the composed and rasterized print image
- G06K15/1872—Image enhancement
- G06K15/1881—Halftoning
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/005—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/005—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations
- G07D7/0054—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties
- G07D7/0055—Testing security markings invisible to the naked eye, e.g. verifying thickened lines or unobtrusive markings or alterations involving markings the properties of which are altered from original properties involving markings displaced slightly from original positions within a pattern
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/2008—Testing patterns thereon using pre-processing, e.g. de-blurring, averaging, normalisation or rotation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2033—Matching unique patterns, i.e. patterns that are unique to each individual paper
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00838—Preventing unauthorised reproduction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00838—Preventing unauthorised reproduction
- H04N1/00856—Preventive measures
- H04N1/00864—Modifying the reproduction, e.g. outputting a modified copy of a scanned original
- H04N1/00867—Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message
- H04N1/0087—Modifying the reproduction, e.g. outputting a modified copy of a scanned original with additional data, e.g. by adding a warning message with hidden additional data, e.g. data invisible to the human eye
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
- H04N1/32251—Spatial or amplitude domain methods in multilevel data, e.g. greyscale or continuous tone data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32203—Spatial or amplitude domain methods
- H04N1/32256—Spatial or amplitude domain methods in halftone data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32352—Controlling detectability or arrangements to facilitate detection or retrieval of the embedded information, e.g. using markers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/95—Pattern authentication; Markers therefor; Forgery detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3235—Checking or certification of the authentication information, e.g. by comparison with data stored independently
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/328—Processing of the additional information
- H04N2201/3281—Encryption; Ciphering
Definitions
- the invention relates to a method for producing security elements in an image which are not visible to the human eye and cannot be copied, as well as printed images according to the preamble of the first and eleventh claim.
- the publication WO 03/007252 A1 describes a method in which a uniquely assigned random code is used to prove originality.
- This code is applied to the product or the corresponding packaging and stored in a central database.
- This central database is accessible via the internet and the customer can enter the corresponding code in an online mask after purchasing a product and thus inquire about the authenticity of the product. If the entered code is not contained in the database, it is a fake. If the code exists in the database and if the code has already been queried before, it is not possible to prove unequivocally which product is the original and whether the product was queried twice. A counterfeit of the product including the code cannot be excluded.
- a more cost-effective solution for implementing copy protection is disclosed in the publication DE 10 2013 019 675 B3.
- This publication relates to a method for the acquisition and reproduction of information which is applied to the surface of information carriers of advertising and/or information media by means of display elements.
- the purpose of the invention is to enable digital communication by means of data elements on information carriers.
- representation elements of a textual and/or pictorial overall representation are recorded by means of a scanner and an encrypted connection code is decoded.
- connection code On the basis of this connection code, the access to a database and the comparison of the identical existing physical information with the identical information in a database takes place.
- the disadvantage of this solution is that by copying the physical information and attaching it to a counterfeit product, the counterfeit product is recognized as original.
- DE 10 2015 009 123 A1 publishes a method for checking the authenticity of the designation of origin and shelf-life indications of products.
- a design surface with an individual security code and a mark is applied to the product.
- the individual security code can be decoded by a scanner.
- a data connection to a database is established.
- the information on the mark and code is compared and a query code based on a mathematical formula is transmitted to the scanning device. Only if the mark, code and query code match, an original product is present.
- the scan code is renewed with every scan, so that only the scanning device that made the last scan knows the current scan code.
- the disadvantage of this solution is that the scan code must be transmitted separately from the original product. If the scan code is lost, the originality of the product can no longer be proven.
- the publication DE 10 2015 006 008 A1 relates to an invention of a method for checking the authenticity of security features on printed and 3D value objects such as checks, vouchers and certificates.
- the security of the detection of forgeries is to be significantly increased above the level of the patents known from the prior art.
- the value object is identified and it is defined where the security features are located on this value object.
- the two- and three-dimensional security features on the object are recorded by a camera.
- the determined values are then sent to a comparison station.
- the comparison station compares the detected features with the stored features.
- the comparison result is then sent back to the scanning device and a statement is made about the authenticity of the object. It is essential that the data is transmitted in encrypted form using a hash function and that at least one 3D security feature is attached to the value object.
- the procedure of this method is provided in several steps:
- edges of the value object are detected by means of the auto focus function. Afterwards, the optical elements within the edges (boundary surfaces) of the value object are captured and recorded in two dimensions. Afterwards, the display elements with security features are selected using predefined surfaces and patterns.
- the selected features are compared with the stored values.
- the detected values are then compared with the security features in a comparison station.
- the increase in security according to this publication is based on a code, which is produced by means of a coding device and to which value objects are additionally attached.
- This code is, for example, the serial number of the value object.
- the transmission of the code between the scanning device and the comparison station is carried out by means of another coding based on a hash function, so that the code cannot be counted back.
- the comparison station the value stored there by means of the identical hash function is then compared with the scanned value that is available as a hash value.
- WO 2017/137155A1 describes a method for the verification of an object provided with a security feature, wherein the security element is manufactured in a multi-step process with register variations.
- register variation a superposition of at least two dot or line grids is used.
- the resulting moiré grids are used to determine a check value which is compared with a reference value for verification.
- several printing processes are used and check digits are stored in selected areas.
- the creation of moiré structures which can be read out optically, is used.
- the grid manipulation is realized by register variations at the printing press and is unavoidable due to the proposed use of different printing processes and serves as a kind of fingerprint to prove the authenticity of the respective print products.
- the banknote to be verified is photographed using a mobile computer device and a corresponding program (application).
- the serial number is then digitized by means of OCR recognition and the minimum and maximum distances of the register shift are used to determine the moiré grid and from this the check value of the banknote.
- the app then establishes a connection to a database and transfers the serial number and the check value to the database.
- the check value and the serial number are compared and the result of the test is transmitted back to the app, which displays the result of the authenticity check accordingly. It is also suggested to further secure the system by applying an additional barcode.
- the change of the partial areas of the marking layer under illumination with visible light and in daylight intensity should not be perceptible with the human eye, but only determined with the help of technical aids, such as magnifying glasses, detectors, etc.
- a laser sweeps over the partial areas shown in a predetermined path, which in turn are determined by the predetermined path of the laser beam.
- Local pyrolysis occurs in the partial areas due to the strong absorption of the laser radiation in the laser-sensitive pigment and its immediate surroundings (diameter up to 10 ⁇ m around the center of a laser-sensitive pigment).
- the publication DE 10 2013 107 951A1 describes a method for verifying the authenticity of a document using at least one piece of additional information, wherein the document has an information feature that refers to the additional information.
- An image of the document is recorded, the information feature in the recorded image is recorded, the additional information is determined on the basis of the recorded information feature and the recorded image is displayed together with the additional information in order to verify the authenticity of the document.
- the invention involves a method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images.
- the image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone.
- the image is reproduced by means of a halftone image, wherein the halftone image consists of individual dots and, according to the invention, at least one field is defined in the image/halftone image, wherein, by means of manipulation of dots in the field and/or by means of manipulation of the entire field, encrypted information that cannot be copied is stored for comparison with at least one database and a serial number is represented by means of contours introduced into the halftone image, wherein each contour is assigned a digit of the serial number and wherein the serial number can be represented in any desired numerical system.
- the image can be in the form of a company logo or as a supplementary representation.
- the invention therefore relates to a system for the authentication of objects, wherein both the verification procedure and associated computer products for carrying out the authentication and the necessary security elements are provided with the objects to be secured.
- Various objects of daily life such as branded products, clothing, documents, machine elements, food as well as value and identification documents are provided with a non-copyable security element. This means that the objects are uniquely identifiable and can no longer be duplicated or copied without permission. In the event of an attempted forgery, the security element is falsified and is no longer recognizable.
- the invention represents an authentication method, which is a multi-step method that optically encrypts an at least binary serial number in an image by varying the screening of full and halftone areas in previously defined regions.
- the image is produced using duplex, four- or multi-color printing or hexachrome printing, letterpress, gravure, planographic printing, through-printing, non-impact printing, 3D printing or a combination of at least two printing processes.
- 3D printing is layered, individual layers and/or partial areas may have a different structure, orientation or shape in the form of fields, which are used to store information for comparison with a database.
- a graphic available as an RGB file or in another color space is rasterized in the RIP process to preferably 4 colors (C—Cyan, M—Magenta, Y—Yellow, K—Black).
- C C or special colors such as G—Green
- detection via digital cameras is detectable.
- special colors, lacquers, luminescent colors or electromagnetically reacting colors can be used as a substitute or supplementary color component, wherein the maximum number is not limited.
- areas are defined for the optical application of a random or arbitrary serial number.
- the contour and size of the areas is completely free and can consist of circles and/or triangles, rectangles, trapeziums, squares, various polygons or freeform surfaces.
- Each area stands for one digit of the serial number. Which area stands for which position of the serial number is displayed in previously defined areas and the part of the serial number shown there.
- the sequence in which the individual digits of the serial number are merged and the hash function used for encryption is determined over at least one defined area by means of the parameters grid change and/or contour.
- the information of the serial number is displayed, which is binary in the preferred variant, i.e. the ranges can assume two states:
- Grid inside a field is identical to grid outside a field or the area inside the field and outside differ.
- One of these states is defined in the binary procedure with a 0 (false), one state with a 1 (true).
- the halftone angle of two of the four colors (CMYK) is partially exchanged.
- the modified graphic is printed using a printing process such as ink jet, laser, offset, gravure, flexo, screen printing or similar, or other digital or analog printing techniques.
- the printing substrate can be chosen at will and ranges from paper to plastics and other natural materials such as wood, stone or artificially produced substrates.
- the form of the printing substrate is also freely selectable and ranges from thread-like structures such as yarns to 2D-structures like paper and foils to 3D structures like parts and components.
- CMYK data preferably with partially exchanged K and M halftones
- CMYK data preferably with partially exchanged K and M halftones
- correspondingly otherwise manipulated data sets in different color spaces or color combinations with further color combinations are sent to the printing device instead of the usual CMYK data created and screened from the print data or corresponding data sets in different color spaces with further color combinations.
- step 5 the at least binary serial number is transformed using a hash function. Which hash function is used was defined in step 2 and is part of the serial number.
- the at least one binary serial number and the transformed information (hash value) are then stored in at least one database and assigned to a container with a further serial number and supplemented by further product data (brand, name, production location, production time, size, color, text length, etc.).
- step 6 the container is filled.
- step 5 is carried out at least once. Preferably, however, this is carried out much more often, for example in the range of 4 k to 20 k, wherein there is no maximum number.
- the container is filled with hash values
- the container itself is encrypted or transformed in a step 7.
- the so-called Merkle tree procedure is used here, i.e. two hash values of a serial number are always transformed with a defined hash function to a new hash value and thus combined.
- the resulting new hash value is stored in the database and then two already combined hash values of serial numbers are transformed again with a hash function (identical or changed). This step is repeated until a single hash value is available for the whole container.
- the encryption path and the hash functions used are also stored in the database and a so-called Merkle path of the container is created.
- this final hash value of the container is written to at least one blockchain (preferably a public blockchain).
- the unalterable storage of the container hash value is completed and each person can publicly read out which hash values exist from the container. Since the hash functions represent an asymmetric encryption and thus a transformation, it is not possible to infer from the publicly available container hash values the combined hash values of the Merkle tree or the hash values of the serial numbers or the respective serial numbers per se.
- the security feature printed in step 4 is recorded with a mobile device, such as a cell phone, camera, tablet, SmartWatch or similar, and further processed in respect of data processing in step 9.
- a mobile device such as a cell phone, camera, tablet, SmartWatch or similar
- a cell phone is used for this purpose on which a special application (software) is installed or integrated into the firmware of the cell phone.
- the app is opened or the camera function with integrated app is started and the security element is recorded in the form of a security feature. If the camera with integrated app is active in standby mode, it is sufficient for the camera to automatically detect the presence of a security feature.
- the RGB image is further processed in step 9a, i.e. a combination of color filters and transformations, such as Fourier transformations, is applied to determine the information content for each individual field of the security feature. In the binary case this is a 0 or 1 or true and false.
- step 9b the first part of the serial number is determined in at least one field, which describes the structure of the serial number and the hash function used to transfer the serial number to the database.
- step 9c the serial number is composed according to step 9b and encrypted with the corresponding hash function in step 9d.
- step 9e the transformed serial number is sent to the database and the Merkle path stored for this hash value is determined according to step 9f.
- the database consists either of a server accessible via the internet or of a combination of several servers or autonomously operating nodes (nods).
- the corresponding container hash is determined by the Merkle tree procedure in a step 9g.
- step 9h the comparison with at least one blockchain is carried out, wherein it is checked whether the determined container hash is present there.
- step 9h case 1 If the container hash is not present, the product is counterfeit and a corresponding error message is transmitted to the mobile device, which outputs this optically and/or acoustically (step 9h case 1).
- the container hash is contained in the blockchain, the information: “Product is genuine” is transmitted to the mobile device and this is displayed visually and/or acoustically.
- additional product parameters such as production date, production location, size, color, etc. are read from the database and transmitted to the mobile device as additional information (step 9h case 2).
- the customer can now make a visual comparison with the product. If the data transmitted from the database does not match the product in question, this is a 2 nd order counterfeit. The customer can report this via the application on the mobile device (step 9h case 3).
- time and geodata are also transmitted to the database and stored.
- Software is used to check in the background whether it is theoretically possible that the data associated with a product can be genuine. For example, if a product is scanned in Hamburg at 9:35 a.m. on Nov. 11, 2035 and 4 minutes later in Los Angeles, there is a 100% probability of a 3 rd order counterfeit. This is also transmitted to the user and indicated visually and/or acoustically (step 9h case 4).
- the customer has the possibility to take a photo of the product in its entirety after detection in a 10th step and enter it into a database via the mobile application. On the basis of this data a corresponding further processing is then carried out.
- the CMYK data is scanned or otherwise digitized and transformed into the RGB color space.
- the merging, shifting and/or combination of different halftone dots of different printing colors into dots during this transformation leads to an unreproducible change in the optically encoded image of the line number, which is significantly enhanced by the application of compression techniques such as JPEG image formats or similar.
- the optically encrypted information in the image is deleted and it is not possible to convert it back into the identical CMYK data.
- reprinting results in images that appear identical or similar to the human eye, the decoding process based on filter applications and transformations cannot recognize the serial number. The reason for the non-recognition is the presence of other information in the security-relevant areas.
- CMYK complementary metal-oxide-semiconductor
- filtering R G and/or B in different ranges of light wavelengths up to the IR or UV range, optionally using additional light sources such as flash or other light sources of the mobile application
- additional light sources such as flash or other light sources of the mobile application
- a printing of the data is not possible on the basis of this filtered and Fourier-transformed information, because only information 0 or 1 is available for the respective ranges.
- step 7 can be followed by steps 8a to 10a:
- the database DB1 is at least one database, at least one cloud and/or at least one blockchain in which the relevant information is stored completely, split and/or encrypted or open.
- the information in DB1 can also provide links to other databases, clouds, blockchains, etc. from which information can be obtained via APIs or other interfaces.
- FIG. 1 shows a schematic representation of an image
- FIG. 2 shows a rotated halftone angle in the color black
- FIG. 3 shows a rotated halftone angle in the color magenta.
- FIG. 1 shows a schematic image A with a dot grid 1 .
- lines arranged in parallel as halftone image have been used in the illustration for better representation.
- the halftone image consists of dots which are arranged next to each other.
- the image shows 5 fields F 1 to F 5 , wherein each field F 1 to F 5 has any geometrical shape or free form.
- the fields F 1 , F 3 , F 4 and F 5 show a different orientation of the halftone image compared to image A.
- Field F 2 has the same orientation of the halftone image as the halftone image of image A.
- a binary representation can be generated in such a way that in case of a deviating orientation of the dots of the field F compared to the image A, a 1 or a 0 can be generated, depending on the previous definition.
- a deviation generates a 1
- the fields F 3 and F 4 can assume the values 2 and 3 respectively, due to the further modification.
- a preferred case is the use of 4 colors CMYK and display of the serial number in the halftones for the colors black (K) according to FIG. 2 and magenta (M) according to FIG. 3 , with the halftone angles swapped between K and M in selected areas.
Abstract
Description
-
- Exchange of the halftone angle between two or more colors
- Change of the halftone angle of at least one color
- Change of the running width or halftone frequency of the cross-line halftone of at least one color
- Change of frequency for frequency-modulated halftones of at least one color
- Change of amplitude for amplitude-modulated halftones of at least one color
- Change of frequency for amplitude-modulated halftones of at least one color
- Change of amplitude for frequency-modulated halftones of at least one color
- Change of the surface area of dots of at least one color
- Change of the contour of the dots of at least one color
- Addition of at least one color (IR, UV or other special color or lacquer)
- Exchange of at least one of the colors CMYK with another color (IR, UV or other special color or lacquer)
- Replacing the color tones achieved by subtractive color mixing of the process colors with at least one special color or spot color
- Change of the achromatic structure by replacing equal parts of the process colors CMY completely or partially with black (K) and/or an additional black tone
- Change of the color composition when printing with more than four process colors, for example in hexachrome printing. For example, by replacing C and Y components with the process color G.
-
- change of the halftone angle in the range of e.g. +/−0.1° to +/−10°;
- change of the running width or halftone frequency of the cross-line halftone in the range of, for example, +/−0.1% to +/−20%;
- change of frequency for frequency-modulated halftones in the range of e.g. +/−0.1% to +/−20%;
- change of amplitude for amplitude-modulated halftones in the range of e.g. +/−0.1% to +/−20%;
- change of frequency for amplitude-modulated halftones in the range of e.g. +/−0.1% to +/−20;
- change of amplitude for frequency-modulated halftones in the range of e.g. +/−0.1% to +/−20%;
- change of the area content of the dots in the range of e.g. +/−0.1% to +/−20%;
- change of the contour of the dots;
- addition of colors (IR, UV or other special color or lacquer);
- exchange of colors CMYK with other colors (IR, UV or other special color or lacquer);
- replacing the color tones achieved by subtractive color mixing of process colors with special color(s) or spot color(s);
- changing the achromatic structure by replacing equal parts of the process colors CMY completely or partially with black (K) and/or an additional black tone;
- changing the color composition when printing with more than four process colors, for example in hexachrome printing. For example, by replacing C and Y components with the process color G;
- 1. A random number is generated. This random number is preferably binary, but can also be of a different type. EX: 010010 and represents the serial number (1). In addition, serial number (1) is written into a database 1 (DB1) and combined there with further product and/or production process data or a link to a manufacturer database is established via an API or other interfaces.
- 2. A hash function A.1 is used to transform the serial number (1) into a hash value (2). EX: from 010010 results 2FX3D. DB1 stores that serial number (1) was transformed with A.1 (if only one hash is used in the whole system, this information can be omitted).
- 3. A container with a random ID (3) is created. EX: 011001. In DB1 it is checked whether the ID already exists, if so, a new number is generated.
- 4. The container with the random ID (3) is filled with hashed product codes 2FX3D, etc. Also when creating each new product serial number (1), DB1 checks if it already exists. If yes, then a new serial number (1) is created and a new check is made to see if the serial number (1) exists in DB1.
- 5. A hash function A.2 is applied to the entire container (3) or two hash values of the serial numbers are always combined by means of a hash function to a further hash value until a final container hash (4) EX: X3YAO is created. This ID (4) is written into a blockchain.
- 6. The resulting Merkle path produced in the transformation by means of Merkle tree procedure is stored in DB1.
- 7. The serial number (1) is applied to a product and read in by means of a scan app. EX: 010010
- 8. In the app, the serial number is converted using a recognized hash function. EX: 010010→2FX3D
- 9. The corresponding Merkle path is retrieved from DB1 and the container hash is determined using the hash value of the serial number (1) 2FX3D and Merkle path X3YAO.
- 10. The app searches the at least one blockchain for the container hash X3YAO. If this value is stored in the blockchain, the serial number (1) 2FX3D is also part of the original container and real.
-
- 8a) App connects to DB1 and sends hash value of serial number (2) to DB1
- 9a) DB1 calculates the container hash based on (2) and the Merkle path (4)
- 10a) DB1 checks if container hash is available in blockchain
- 11a) If yes, then transfer the information “Product is genuine” to mobile device. If no, then the information “Product is counterfeit” is transmitted to the mobile device.
- a) Rasterization of a graphic in the RGB color space (or another color space) in a hardware or software raster image process (RIP) into a CMYK halftone or into another printable color space consisting of more or less colors
- b) Determination of the optical coding of the serial number, including:
- a. Determination of the coding areas
- b. Determination of the outer contours of the coding
- c. Determination of the sequence in which the areas are arranged in sequence for coding
- d. Determination of the hash function for the transformation of the serial number (1)
- c) Creating the serial number (1.1) for the implementation in the graphic
- d) Change of the rasterization according to the coding information of the serial number (1.1)
- e) Printing the information.
- a) Recording of the print image (CMYK or other printable color space)
- b) After recording, the data is available in the RGB color space or in another color space recognizable by optical systems such as camera systems Application of filters and Fourier transformation
- d) Recognizing of fields/areas if there is
information 0 or 1 (binary case) per code field and reading of the serial number (1.1). If halftones for several colors are varied or several variation possibilities are used, one value can be assumed for each color or variation. For all CMYK then for example B. 0, 1, 2, 3 when using special colors, further information states can be assumed for each special color. - e) Comparison with DB1 in which fields the information for the optical decoding (field contour, sequence and hash function) for serial number (1.1) is located
- f) Determination of the decoding value
- g) Determination of the serial number (1) and transformation of the serial number (1) using the corresponding hash function
- h) Further processing of the hash value of the serial number (2).
Claims (14)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102018115146.2 | 2018-06-24 | ||
DE102018115146.2A DE102018115146A1 (en) | 2018-06-24 | 2018-06-24 | Process for producing security elements that are invisible to the human eye and cannot be copied in an image, and method for verifying the authenticity of products based on the comparison of unequal information and printed image |
PCT/DE2019/100575 WO2020001695A1 (en) | 2018-06-24 | 2019-06-22 | Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image |
Publications (2)
Publication Number | Publication Date |
---|---|
US20210245542A1 US20210245542A1 (en) | 2021-08-12 |
US11715309B2 true US11715309B2 (en) | 2023-08-01 |
Family
ID=67539171
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/973,072 Active US11587339B2 (en) | 2018-06-24 | 2019-06-22 | Method for reading a code stored in a halftone image and comparison with a retrievable value |
US16/973,071 Active US11715309B2 (en) | 2018-06-24 | 2019-06-22 | Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/973,072 Active US11587339B2 (en) | 2018-06-24 | 2019-06-22 | Method for reading a code stored in a halftone image and comparison with a retrievable value |
Country Status (5)
Country | Link |
---|---|
US (2) | US11587339B2 (en) |
EP (2) | EP3791368A1 (en) |
CN (2) | CN112292716A (en) |
DE (1) | DE102018115146A1 (en) |
WO (2) | WO2020001695A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11724533B2 (en) | 2018-04-06 | 2023-08-15 | Esko-Graphics Imaging Gmbh | System and process for persistent marking of flexo plates and plates marked therewith |
CN112204463A (en) | 2018-04-06 | 2021-01-08 | 埃斯科绘图成像有限责任公司 | Method for permanently marking a flexographic printing plate with workflow information and plate marked therewith |
DE102018115146A1 (en) * | 2018-06-24 | 2019-12-24 | Industry365 Ug (Haftungsbeschränkt) | Process for producing security elements that are invisible to the human eye and cannot be copied in an image, and method for verifying the authenticity of products based on the comparison of unequal information and printed image |
FR3085304B1 (en) | 2018-08-31 | 2021-01-08 | D Uniflexo | PHOTOSENSITIVE PRINTER SHAPE FOR A FLEXOGRAPHIC PRINTING PROCESS INCLUDING VISIBLE AND NON-PRINTING INFORMATION, PROCESS FOR PREPARING SUCH A PRINTER SHAPE |
EP3660770A1 (en) * | 2018-11-30 | 2020-06-03 | Mastercard International Incorporated | Methods and systems for secure product tracking data storage and verification |
WO2021069489A1 (en) | 2019-10-07 | 2021-04-15 | Esko-Graphics Imaging Gmbh | System and process for persistent marking of flexo plates and plates marked therewith |
CN116569228A (en) | 2020-11-12 | 2023-08-08 | 尤尼卡系统股份有限公司 | Method for printing and identifying a raster-printed authentication mark with amplitude modulation |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1234521A (en) | 1998-01-12 | 1999-11-10 | 朱拉特拉德有限公司 | Anti-counterfeiting method and apparatus using digital screening |
US20020054355A1 (en) * | 2000-10-11 | 2002-05-09 | Brunk Hugh L. | Halftone watermarking and related applications |
DE10118679A1 (en) | 2001-04-14 | 2002-10-24 | Henkel Kgaa | Process for identifying or authenticating a marked object comprises detecting the ferromagnetic resonance of at least one ferromagnetic-resonance active marker substance |
WO2003007252A1 (en) | 2001-06-20 | 2003-01-23 | Kezzler As | Method for generation of authentication information and use thereof |
WO2005011920A1 (en) | 2003-07-28 | 2005-02-10 | Irwin Industrial Tools Gmbh | Vice |
DE102008034022A1 (en) | 2008-07-16 | 2010-01-21 | Merck Patent Gmbh | Method for producing a security and / or value product with subregions with different luminescence emission |
CN102407703A (en) | 2010-09-25 | 2012-04-11 | 天津市阿波罗信息技术有限公司 | Another processing method for digitized anti-fake printing |
US20130314468A1 (en) | 2012-05-22 | 2013-11-28 | Juan Manuel Jimenez | Detecting media type using carriage-coupled sensor |
US20130314486A1 (en) | 2010-11-08 | 2013-11-28 | U-Nica Technology Ag | Method and device for producing colour images by way of a uv laser on pigmented substrates, and products produced as a result |
DE102013019675B3 (en) | 2013-05-29 | 2014-11-27 | Wolfgang Beyer | System and method for the retrievable storage, recording and reproduction of information of the advertising and information media |
DE102013107951A1 (en) | 2013-07-25 | 2015-01-29 | Bundesdruckerei Gmbh | Procedure for verifying the authenticity of a document |
US20150036890A1 (en) * | 2012-02-15 | 2015-02-05 | Glenisys Kft. | Security Element and Method to Inspect Authenticity of a Print |
DE102015006008A1 (en) | 2015-05-13 | 2016-11-17 | Wolfgang Beyer | Method for checking the authenticity of security features on value objects |
DE102015009123A1 (en) | 2015-07-20 | 2017-01-26 | Wolfgang Beyer | Procedure for checking the authenticity of the indication of origin and the shelf life of products |
CN106407795A (en) | 2016-09-05 | 2017-02-15 | 北京众享比特科技有限公司 | Data existence authentication system, authentication method and verification method |
DE102016001464A1 (en) | 2016-02-09 | 2017-08-10 | Giesecke & Devrient Gmbh | Verification of an item provided with a security element |
US20210248369A1 (en) * | 2018-06-24 | 2021-08-12 | Industry 365 UG (Haftungsbeschränkt) | Method for Checking the Authenticity of Products and Printed Image |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7394573B1 (en) * | 1999-04-14 | 2008-07-01 | Xerox Corporation | System for authenticating hardcopy documents |
FR2805618B1 (en) | 2000-02-29 | 2002-04-12 | Commissariat Energie Atomique | SYSTEM FOR AUTHENTICATING MANUFACTURED ARTICLES WITH MAGNETIC MARKINGS, AND METHOD FOR MARKING SUCH ARTICLES |
US20030197878A1 (en) * | 2002-04-17 | 2003-10-23 | Eric Metois | Data encoding and workpiece authentication using halftone information |
US7751608B2 (en) * | 2004-06-30 | 2010-07-06 | Ecole Polytechnique Federale De Lausanne (Epfl) | Model-based synthesis of band moire images for authenticating security documents and valuable products |
DE10328328B4 (en) * | 2003-06-25 | 2015-06-03 | TÜV Rheinland Holding AG | Product protection portal and method for checking the authenticity of products |
DE102005008135A1 (en) * | 2005-02-21 | 2006-08-31 | Giesecke & Devrient Gmbh | Disk with halftone image |
CN101537751B (en) * | 2009-04-10 | 2015-03-18 | 顾泽苍 | Novel method for processing anti-counterfeit printing |
KR101114542B1 (en) * | 2009-10-28 | 2012-02-27 | (주)이컴앤드시스템 | Discrimination method and apparatus for forgery of wertpapier, and Recording medium thereof |
JP2011103023A (en) * | 2009-11-10 | 2011-05-26 | B-Core Inc | Method and device for reading color arrangement code |
CN101727593B (en) * | 2009-11-20 | 2014-07-23 | 天津市阿波罗信息技术有限公司 | Method for processing digitalized paper card |
MX2013004043A (en) * | 2010-10-11 | 2013-10-03 | Graphic Security Systems Corp | Method for constructing a composite image incorporating a hidden authentication image. |
JP5721101B2 (en) * | 2011-04-21 | 2015-05-20 | 独立行政法人 国立印刷局 | Halftone print and method for producing the same |
JP5678364B2 (en) * | 2011-09-22 | 2015-03-04 | 独立行政法人 国立印刷局 | Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof |
DE102011120848B3 (en) * | 2011-12-09 | 2013-05-23 | Giesecke & Devrient Gmbh | Security element for valuable objects e.g. chipcard, has plastic substrate comprising color layer that is embedded with magnetic particle, where portion of particle is arranged proximity of limiting surface between covering and color layers |
US9361516B2 (en) * | 2012-02-09 | 2016-06-07 | Hewlett-Packard Development Company, L.P. | Forensic verification utilizing halftone boundaries |
US8824733B2 (en) * | 2012-03-26 | 2014-09-02 | Tk Holdings Inc. | Range-cued object segmentation system and method |
JP5344328B1 (en) * | 2012-10-01 | 2013-11-20 | 健治 吉田 | Dot pattern, dot pattern forming medium, dot pattern image data generating program, dot pattern forming device, optical device, optical reader, information input / output device, dot pattern reader |
JP5822411B2 (en) * | 2013-08-12 | 2015-11-24 | 株式会社アポロジャパン | Image information code conversion apparatus, image information code conversion method, image related information providing system using image code, image information code conversion program, and recording medium recording the program |
EP2920717A4 (en) * | 2014-02-04 | 2015-12-09 | Moshe Koren | System for authenticating items |
CN103997591A (en) * | 2014-05-09 | 2014-08-20 | 佛山市绿之彩印刷有限公司 | Invisible code graphics, processing method thereof and anti-fake application |
CN106156821A (en) * | 2015-03-24 | 2016-11-23 | 天津市阿波罗信息技术有限公司 | A kind of optical readability bar code anti-counterfeit structure and implementation method |
EP3281183B1 (en) * | 2015-04-09 | 2022-07-13 | FiliGrade B.V. | Method of verifying an authenticity of a printed item and data processing terminal |
EA031834B1 (en) * | 2015-07-01 | 2019-02-28 | Дмитрий Маринкин | Method for identifying authenticity of an item having security marking on its surface |
CN106886811A (en) * | 2015-12-10 | 2017-06-23 | 顾泽苍 | A kind of constructive method and reading method of mobile phone commodity false proof mark |
CN106372533B (en) * | 2016-09-14 | 2020-04-21 | 中国银联股份有限公司 | Content storage method based on block chain technology |
CN106570710A (en) * | 2016-10-27 | 2017-04-19 | 纸飞机(北京)科技有限公司 | Commodity anti-counterfeiting method and device |
US10417409B2 (en) * | 2017-03-21 | 2019-09-17 | Hid Global Corp. | Securing credentials with optical security features formed by quasi-random optical characteristics of credential substrates |
CN107798372B (en) * | 2017-11-24 | 2021-05-11 | 深圳市裕同包装科技股份有限公司 | Encoding method, decoding method and decoding system of product information dot matrix image |
US10261846B1 (en) * | 2018-02-09 | 2019-04-16 | Banjo, Inc. | Storing and verifying the integrity of event related data |
-
2018
- 2018-06-24 DE DE102018115146.2A patent/DE102018115146A1/en active Pending
-
2019
- 2019-06-22 US US16/973,072 patent/US11587339B2/en active Active
- 2019-06-22 EP EP19749178.0A patent/EP3791368A1/en not_active Withdrawn
- 2019-06-22 WO PCT/DE2019/100575 patent/WO2020001695A1/en unknown
- 2019-06-22 CN CN201980041941.0A patent/CN112292716A/en active Pending
- 2019-06-22 US US16/973,071 patent/US11715309B2/en active Active
- 2019-06-22 CN CN201980042323.8A patent/CN112313716B/en active Active
- 2019-06-22 WO PCT/DE2019/100576 patent/WO2020001696A1/en unknown
- 2019-06-22 EP EP19749177.2A patent/EP3791367A1/en not_active Withdrawn
Patent Citations (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1048168A1 (en) | 1998-01-12 | 2000-11-02 | Jura-Trade Kereskedelmi KFT | Anti-counterfeiting method and apparatus using digital screening |
CN1234521A (en) | 1998-01-12 | 1999-11-10 | 朱拉特拉德有限公司 | Anti-counterfeiting method and apparatus using digital screening |
US20020054355A1 (en) * | 2000-10-11 | 2002-05-09 | Brunk Hugh L. | Halftone watermarking and related applications |
DE10118679A1 (en) | 2001-04-14 | 2002-10-24 | Henkel Kgaa | Process for identifying or authenticating a marked object comprises detecting the ferromagnetic resonance of at least one ferromagnetic-resonance active marker substance |
WO2003007252A1 (en) | 2001-06-20 | 2003-01-23 | Kezzler As | Method for generation of authentication information and use thereof |
WO2005011920A1 (en) | 2003-07-28 | 2005-02-10 | Irwin Industrial Tools Gmbh | Vice |
DE102008034022A1 (en) | 2008-07-16 | 2010-01-21 | Merck Patent Gmbh | Method for producing a security and / or value product with subregions with different luminescence emission |
CN102407703A (en) | 2010-09-25 | 2012-04-11 | 天津市阿波罗信息技术有限公司 | Another processing method for digitized anti-fake printing |
US20130314486A1 (en) | 2010-11-08 | 2013-11-28 | U-Nica Technology Ag | Method and device for producing colour images by way of a uv laser on pigmented substrates, and products produced as a result |
US20150036890A1 (en) * | 2012-02-15 | 2015-02-05 | Glenisys Kft. | Security Element and Method to Inspect Authenticity of a Print |
US20130314468A1 (en) | 2012-05-22 | 2013-11-28 | Juan Manuel Jimenez | Detecting media type using carriage-coupled sensor |
DE102013019675B3 (en) | 2013-05-29 | 2014-11-27 | Wolfgang Beyer | System and method for the retrievable storage, recording and reproduction of information of the advertising and information media |
DE102013107951A1 (en) | 2013-07-25 | 2015-01-29 | Bundesdruckerei Gmbh | Procedure for verifying the authenticity of a document |
DE102015006008A1 (en) | 2015-05-13 | 2016-11-17 | Wolfgang Beyer | Method for checking the authenticity of security features on value objects |
DE102015009123A1 (en) | 2015-07-20 | 2017-01-26 | Wolfgang Beyer | Procedure for checking the authenticity of the indication of origin and the shelf life of products |
DE102016001464A1 (en) | 2016-02-09 | 2017-08-10 | Giesecke & Devrient Gmbh | Verification of an item provided with a security element |
WO2017137155A1 (en) | 2016-02-09 | 2017-08-17 | Giesecke & Devrient Gmbh | Verification of an object provided with a security element |
CN106407795A (en) | 2016-09-05 | 2017-02-15 | 北京众享比特科技有限公司 | Data existence authentication system, authentication method and verification method |
US20210248369A1 (en) * | 2018-06-24 | 2021-08-12 | Industry 365 UG (Haftungsbeschränkt) | Method for Checking the Authenticity of Products and Printed Image |
Also Published As
Publication number | Publication date |
---|---|
CN112313716B (en) | 2023-05-26 |
DE102018115146A1 (en) | 2019-12-24 |
US20210245542A1 (en) | 2021-08-12 |
WO2020001695A1 (en) | 2020-01-02 |
EP3791368A1 (en) | 2021-03-17 |
EP3791367A1 (en) | 2021-03-17 |
US20210248369A1 (en) | 2021-08-12 |
CN112292716A (en) | 2021-01-29 |
WO2020001696A1 (en) | 2020-01-02 |
US11587339B2 (en) | 2023-02-21 |
CN112313716A (en) | 2021-02-02 |
WO2020001695A4 (en) | 2020-02-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11715309B2 (en) | Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image | |
JP4898999B2 (en) | Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device | |
US6985607B2 (en) | System and method for authenticating objects | |
KR20030019398A (en) | System and method for productiion and authentication of original documents | |
RU2746027C2 (en) | Method for checking the authenticity of a printed product and data processing terminal | |
JP2015515388A (en) | Security element and method of checking the authenticity of the stamp | |
JP5799425B2 (en) | Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof | |
CN109376833B (en) | Triple anti-counterfeiting two-dimensional code for pseudo-random information overprinting digital fluorescent image | |
JP4352168B2 (en) | Halftone image data authentication program, halftone print authentication system, and halftone image data authentication system | |
JP5768236B2 (en) | Anti-counterfeit printed matter, anti-counterfeit printed material preparation apparatus, and anti-counterfeit printed matter preparation method | |
CN109711513B (en) | Triple anti-counterfeiting two-dimensional code with double-code of digital fluorescent image overprinting bright and dark | |
JP5990791B2 (en) | Anti-counterfeit printed matter | |
JP2006295893A (en) | Printed matter formation method, printed matter forming instrument, authenticity discrimination method, authenticity discrimination instrument, and printed matter | |
CN107209970A (en) | Based on manufacture be related to different process relative position change measurement come confirm and certification safety document method | |
KR102500424B1 (en) | How to verify security devices containing signatures | |
US20220150378A1 (en) | Method of Printing Authentication Indicators with Amplitude Modulated Halftone Printing | |
Tkachenko | Generation and analysis of graphical codes using textured patterns for printed document authentication | |
JP5678364B2 (en) | Printed material capable of authenticating authenticity, manufacturing apparatus and manufacturing method thereof, authentication apparatus for printed matter capable of authenticating authenticity and authentication method thereof | |
JP4883457B2 (en) | Printed material production method, printed material and authenticity determination method | |
RU2616448C1 (en) | Method for producing valuable document, valuabl document and method for determining its authenticity | |
JP2022114031A (en) | Device, method, and software for verifying authenticity of printed materials | |
CN116569228A (en) | Method for printing and identifying a raster-printed authentication mark with amplitude modulation | |
CN109726789A (en) | Hide the anti-fake two-dimension code of digital signature | |
JP2002157626A (en) | Method and system for printed matter authentication, and printed matter with embedded identification information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
AS | Assignment |
Owner name: INDUSTRY365 UG (HAFTUNGSBESCHRAENKT), GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KAUFMANN, JOERG;THEEG, FRANK;ZELLMER, HOLGER;SIGNING DATES FROM 20201201 TO 20201211;REEL/FRAME:054644/0049 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: APPLICATION DISPATCHED FROM PREEXAM, NOT YET DOCKETED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: AUTHENTIC.NETWORK GMBH, GERMANY Free format text: CHANGE OF NAME;ASSIGNOR:INDUSTRY365 UG (HAFTUNGSBESCHRAENKT);REEL/FRAME:060202/0316 Effective date: 20210722 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |